Cloudflare Docs
Visit Cloudflare Zero Trust on GitHub
Set theme to dark (⇧+D)


Centrify secures access to infrastructure, DevOps, cloud, and other modern enterprise so you can prevent the number one cause of breaches: privileged access abuse.

Set up Centrify

These steps help you set up Centrify as your identity provider:

  1. Log in to the Centrify administrator panel.

  2. Click Apps.

    Centrify Security Overview

  3. Click Add Web Apps.

  4. Select the Custom tab and click Add OpenID Connect.

  5. On the Add Web App screen click Yes to create an OpenID Connect application.

    Add Web App screen

  6. Enter an Application ID.

    Centrify Settings

  7. Click Save.

  8. Click Trust in the Settings menu.

  9. Enter a strong application secret on the Trust section.

  10. Under Service Provider Configuration enter your application’s authentication domain as the resource application URL.

  11. Under Authorized Redirect URIs click Add.

    Centrify OpenID Connect

  12. Under Authorized Redirect URIs enter your team domain followed by this callback at the end of the path: /cdn-cgi/access/callback. For example:

  13. Click Save.

    Centrify Trust

  14. Take note of the Client ID, Client Secret, OpenID Connect Issuer URL, and Application ID from the Settings tab.

  15. Navigate to the User Access tab.

  16. Select the roles to grant access to your application.

    Centrify User Access

  17. On the Zero Trust dashboard, navigate to Settings > Authentication.

  18. Under Login methods, click Add new.

  19. Paste in the Client ID, Client Secret, Centrify account URL and Application ID.

  20. Click Save.

To test that your connection is working, navigate to Authentication > Login methods and click Test next to the login method you want to test.

Example API Config

"config": {
"client_id": "<your client id>",
"client_secret": "<your client secret>",
"centrify_account": "",
"centrify_app_id": "exampleapp"
"type": "centrify",
"name": "my example idp"